Hundreds of Unauthenticated ICS Devices, Including for Power Grids, Found Exposed Online

Comparitech Research Finds Internet-Exposed ICS Devices Using Insecure Modbus Protocol

HIGH
April 11, 2026
5m read
Industrial Control SystemsVulnerabilityThreat Intelligence

Related Entities

Organizations

Products & Tech

Modbus

Other

Comparitech

Full Report

Executive Summary

Research conducted by technology evaluation firm Comparitech has uncovered at least 179 Industrial Control System (ICS) devices directly exposed to the public internet and configured to communicate using the insecure Modbus protocol without any form of authentication. These vulnerable systems are linked to highly critical entities, including a national railway and two national power grids, making them prime targets for disruption by malicious actors. The findings, which likely represent only a fraction of the total exposure, corroborate recent government warnings about nation-state adversaries targeting Operational Technology (OT). The research highlights a critical failure in security fundamentals and a pervasive lack of visibility, as noted by cybersecurity firm Dragos, which estimates that over 90% of global OT networks lack the necessary monitoring to detect such threats.


Threat Overview

What Was Found: The research identified 179 ICS devices (e.g., PLCs, RTUs) accessible from the internet that were actively listening for connections on TCP port 502, the default port for the Modbus protocol.

The Core Vulnerability: Modbus is a serial communications protocol developed in 1979. Its common implementation over TCP/IP (Modbus/TCP) lacks any native security features like authentication or encryption. This means that anyone who can connect to the device on port 502 can send it valid commands, such as:

  • Reading the device's status (coils and registers).
  • Writing new values to the device, effectively changing its operational parameters.
  • Forcing the device to restart or stop its process.

Who's Affected: The exposed devices were linked to critical infrastructure sectors globally, with specific mentions of:

  • A national railway system.
  • Two national power grids.

Impact: A successful attack on one of these devices could have severe physical consequences. An attacker could shut down a section of a power grid, change a railway switch, or disrupt a manufacturing process, leading to blackouts, accidents, or significant economic damage. This direct exposure allows attackers to bypass the traditional attack path of compromising an IT network first and then pivoting to the OT network.


Technical Analysis

The vulnerability is not a software flaw in the traditional sense, but a critical architectural and configuration failure. The protocol is working as designed; the failure is in connecting a non-authenticated protocol to the world's most hostile network.

Tactics, Techniques, and Procedures (TTPs) of a Potential Attacker

  1. Reconnaissance (T1595.002 - Vulnerability Scanning): Attackers use tools like Shodan, Censys, or masscan to search the entire internet for devices responding on TCP port 502.
  2. Initial Access (T1190 - Exploit Public-Facing Application): The 'application' in this case is the Modbus service itself. Access is gained simply by connecting to the open port.
  3. Discovery (T1213 - Data from Information Repositories): Once connected, an attacker can send Modbus 'read' commands to query all available data points on the device, effectively mapping out its function and the process it controls.
  4. Impact (T0829 - Control Device): After discovery, the attacker can send Modbus 'write' commands to alter the device's configuration, shut it down, or manipulate its process, leading to a physical impact.

The simplicity of this attack is what makes it so dangerous. It requires no exploit code, no zero-days, and no sophisticated tools—just a basic understanding of the Modbus protocol and the IP address of a target.


Impact Assessment

The business impact of exploiting one of these exposed devices ranges from severe to catastrophic. For a national power grid, it could mean widespread blackouts, economic disruption, and even civil unrest. For a railway, it could lead to collisions or derailments, resulting in loss of life. The research from Comparitech, while focused on a small number of devices, points to a systemic problem. The lack of OT network visibility reported by Dragos means that most organizations are likely unaware of these exposures, making them ticking time bombs in the face of increased nation-state interest in targeting critical infrastructure.


Cyber Observables for Detection

Type Value Description
port 502 Default Modbus/TCP port. Any unsolicited inbound traffic from the internet to this port is a critical security finding.
url_pattern Shodan search: port:502 Organizations should be proactively running searches like this, scoped to their own IP ranges, to find and remediate exposures.
network_traffic_pattern Internet -> DMZ -> OT Network on Port 502 Even in a segmented network, allowing Modbus traffic from the internet into the OT environment is a high-risk configuration that should be eliminated.
log_source Perimeter Firewall Logs Regularly review logs for any traffic, allowed or denied, on port 502. Allowed traffic is a critical misconfiguration; denied traffic indicates active scanning by adversaries.

Detection & Response

  • Detection: The primary detection method is proactive asset discovery and vulnerability scanning. Organizations must scan their own external-facing IP address space for open OT ports like 502 (Modbus), 44818 (EtherNet/IP), and 102 (S7comm). This is not an intrusion detection problem; it's a security hygiene problem. (D3FEND Technique: D3-VSS: Vulnerability Scan Scrutiny)
  • Response: If an exposed device is found:
    1. Immediately implement a firewall rule to block all internet access to the affected port and IP address.
    2. Investigate the device and its logs (if available) to determine if it has been accessed or manipulated by unauthorized parties.
    3. Develop a long-term plan to move the device behind a secure remote access solution, such as a VPN, if external access is required.

Mitigation

  1. Network Isolation: As with all ICS/OT security, the number one priority is to ensure these devices are not on the public internet. Isolate the OT network from all other networks. (MITRE Mitigation: M1030 - Network Segmentation)
  2. Deny by Default: Implement a default-deny firewall policy at the IT/OT boundary. No traffic should pass unless it is explicitly allowed, and no traffic should ever be allowed directly from the internet to the OT network.
  3. Use Secure Protocols or Wrappers: When possible, use more secure protocols. If legacy protocols like Modbus must be used, encapsulate them in a secure, authenticated, and encrypted tunnel (e.g., IPSec VPN). (D3FEND Countermeasure: Encrypted Tunnels)
  4. Continuous Monitoring: Implement continuous asset discovery and security monitoring for the OT environment to gain the visibility that most organizations currently lack. This allows for rapid detection of new, unauthorized, or misconfigured devices.

Timeline of Events

1
April 11, 2026
This article was published

MITRE ATT&CK Mitigations

Isolating the OT network from the internet is the single most important mitigation for this threat.

Strict firewall rules should be in place to block all access to OT-related ports like 502 from the internet.

Audit

M1047enterprise

Continuously audit your external attack surface to identify and remediate exposures like open Modbus ports.

D3FEND Defensive Countermeasures

The most fundamental defense against the threat of exposed Modbus devices is strict inbound traffic filtering at the network perimeter. Organizations must configure their border firewalls with a default-deny policy. Specifically, create an explicit rule to block all inbound traffic on TCP port 502 from any source. This rule should be placed at the top of the firewall policy to ensure it is enforced. This simple, yet critical, action prevents attackers from even discovering the device via internet-wide scans. Organizations should regularly audit their firewall rulebases to ensure such a rule is in place and has no exceptions. This is a basic security hygiene practice that directly mitigates the risk highlighted by the Comparitech research.

Organizations with OT assets cannot rely solely on passive defense; they must actively hunt for their own exposures. This involves implementing a continuous program of external attack surface management. Use vulnerability scanning tools or subscribe to services that constantly scan your organization's public IP ranges for open ports and services. Specifically configure these scans to look for OT ports like 502 (Modbus), 102 (S7), and 44818 (EtherNet/IP). The results of these scans must be fed directly into a remediation workflow, with critical findings like an open Modbus port triggering a high-priority alert for the security and network teams. This proactive self-scanning turns the tables, allowing you to find and fix vulnerabilities before adversaries do.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ICSOT SecurityModbusComparitechCritical InfrastructureVulnerabilityPower Grid

📢 Share This Article

Help others stay informed about cybersecurity threats